Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Public-Key Identification Scheme Based on a New NP-Hard Tensor Problem Akitaka Yokota, Bagus Santoso (UEC) IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 |
No general quantum algorithm is known to efficiently solve computational problems based on
Multivariate Quadratic Poly... [more] |
IT2023-90 ISEC2023-89 WBS2023-78 RCC2023-72 pp.94-101 |
RCC, ISEC, IT, WBS |
2024-03-14 16:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Tradeoff relations between entropic quantities and their application in quantum information theory Michele Dall'Arno (Toyohashi U. of Technology) IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 |
In this presentation we introduce tradeoff relations between entropic quantities such as Renyi entropies, the subentropy... [more] |
IT2023-133 ISEC2023-132 WBS2023-121 RCC2023-115 pp.366-367 |
SIP, IT, RCS |
2024-01-18 13:15 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
A Revisit to Proximal Decoding for LDPC codes Tadashi Wadayama (NiTech) IT2023-42 SIP2023-75 RCS2023-217 |
In this invited talk,
our proposed algorithm, {em proximal decoding}, is revisited and
some optimization-based decodi... [more] |
IT2023-42 SIP2023-75 RCS2023-217 p.68 |
COMP |
2023-10-24 13:30 |
Aichi |
Nagoya Univ. Venture Business Lab. |
An algorithm for the secure total domination problem in proper interval graphs Toru Araki, Yasufumi Aita (Gunma Univ.) COMP2023-11 |
A subset $S$ of vertices of $G$ is a total dominating set if, for any vertex $v$, there is a vertex in $S$ adjacent to $... [more] |
COMP2023-11 pp.1-8 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-20 14:40 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
Enhanced EMI Filter Design by a Combination of Preference Set-based Design and Polynomial Chaos Methods under Multiple Uncertain Parameters Bui Duc Chinh, Yoshiki Kayano, Fengchao Xiao, Yoshio Kami (UEC) EMCJ2023-66 MW2023-120 EST2023-93 |
This paper presents a comprehensive approach combining statistical analysis through Polynomial Chaos (PC) method with a ... [more] |
EMCJ2023-66 MW2023-120 EST2023-93 pp.158-163 |
R |
2023-09-28 15:20 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
Polynomial Failure Models: Theory and Applications Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2023-41 |
In this paper we summarize two polynomial failure models, where the lifetime distributions are described by canonical po... [more] |
R2023-41 pp.22-27 |
CCS, NLP |
2023-06-09 14:20 |
Tokyo |
Tokyo City Univ. |
Sequence period of sequences generated by fourth-order reccurence relations with two variables over Z 2k Daisaburo Yoshioka (Sojo Univ.) NLP2023-25 CCS2023-13 |
In recent years, a public-key cryptosystem based on Chebyshev polynomials over the residue ring of modulo 2k has been pr... [more] |
NLP2023-25 CCS2023-13 pp.53-56 |
RCC, ISEC, IT, WBS |
2023-03-14 13:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Signature scheme based on OSIDH Kohtaroh Aoyagi (TUT), Hiroki Minamide (NITTC), Koutarou Suzuki (TUT) IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 |
Isogeny-based cryptography, post-quantum cryptography, is a cryptographic technique that has attracted attention because... [more] |
IT2022-90 ISEC2022-69 WBS2022-87 RCC2022-87 pp.135-141 |
RCC, ISEC, IT, WBS |
2023-03-15 10:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Efficient composition of encoding polynomial in distributed coded computing scheme Daisuke Hibino, Tomoharu Shibuya (Sophia Univ.) IT2022-119 ISEC2022-98 WBS2022-116 RCC2022-116 |
Distributed computing is one of the powerful solutions for computational tasks that need the massive size of dataset. La... [more] |
IT2022-119 ISEC2022-98 WBS2022-116 RCC2022-116 pp.325-330 |
COMP |
2023-03-02 14:45 |
Tokyo |
Ochanomizu University |
Correcting the algorithm for a minimum secure dominating set of proper interval graphs Toru Araki, Ryuya Saito (Gunma Univ.) COMP2022-36 |
In [A simple algorithm for secure domination in proper interval graphs, Discrete Applied Mathematics 260 (2019) 289--293... [more] |
COMP2022-36 pp.16-20 |
ICTSSL, CAS |
2023-01-26 11:15 |
Tokyo |
TBD (Primary: On-site, Secondary: Online) |
On Image Recognition Neural Networks and Polynomial Approximation of Images Jiahang Chang, Kazuya Ozawa, Hideaki Okazaki (SIT) CAS2022-66 ICTSSL2022-30 |
In this report, we present a convolutional neural network that we have built ourselves for our research. Then, we discus... [more] |
CAS2022-66 ICTSSL2022-30 pp.23-27 |
EST |
2023-01-26 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Statistical Analysis of Multiconductor Non-Uniform Transmission Line with Variations in Line Height and Line gap using Polynomial Chaos Methods Yuto Hachiga, Yoshiki Kayano, Yoshio Kami, Fengchao Xiao (UEC) EST2022-85 |
Monte Carlo (MC) method, which is commonly used in a statistical analysis, can perform highly accurate calculations, but... [more] |
EST2022-85 pp.58-63 |
COMP |
2022-10-26 11:45 |
Fukuoka |
Kyusyu Univ. Nishijin Plaza |
Evacuation problems on grid networks with uniform transit time and uniform capacity Yuki Tokuni, Naoki Katoh, Junichi Teruyama, Yuya Higashikawa (Uoh) COMP2022-15 |
We consider the problem of finding the minimum time at which all supplies on a dynamic flow network can reach the demand... [more] |
COMP2022-15 pp.7-13 |
COMP |
2022-10-26 14:30 |
Fukuoka |
Kyusyu Univ. Nishijin Plaza |
Efficient Enumeration of Spanning Subgraphs in Planar Graphs with Edge Connectivity Constraints Yasuaki Kobayashi (Hokkaido Univ.), Kazuhiro Kurita (Nagoya Univ.), Kunihiro Wasa (Hosei Univ.) COMP2022-17 |
In this paper, we address an efficient enumeration of spanning subgraphs in planar graphs with edge-connected constraint... [more] |
COMP2022-17 pp.21-28 |
R |
2022-10-07 14:25 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A note on Polynomial Software Reliability Models Siqiao Li, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2022-35 |
In this article, we propose two novel non-homogeneous Poisson process (NHPP)-based software reliability models (SRMs), c... [more] |
R2022-35 pp.19-24 |
SIP |
2022-08-25 13:03 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki Island) (Primary: On-site, Secondary: Online) |
Computational Cost Reduction in 1-Dimensional Null Space Estimation of Noisy Structured Matrices Natsuki Yoshino, Akira Tanaka (Hokudai) SIP2022-51 |
The structured total least norm method has been proposed for estimating the one-dimensional null space of structured mat... [more] |
SIP2022-51 pp.7-12 |
NLP |
2022-08-02 09:50 |
Online |
Online |
Characteristics of degree period of commutative polynomials defined by fourth-order recurrence relations with two variables over Z2K Takuma Nishizaka, Daisaburo Yoshioka (Sojo Univ.) NLP2022-28 |
In recent years, a public-key cryptosystem based on Chebyshev polynomials over Z_{2^k} has been presented. Unfortunately... [more] |
NLP2022-28 pp.11-14 |
COMP, IPSJ-AL |
2022-05-19 13:00 |
Online |
Online |
Transportation Problem on a Graph Tetsuo Asano (Kanazawa Univ.) COMP2022-1 |
We consider a transportation problem defined on a node-weighted undirected graph. Weight is positive if the amount of c... [more] |
COMP2022-1 pp.1-8 |
VLD, HWS [detail] |
2022-03-07 11:25 |
Online |
Online |
Design and Measurement of Crypto Processor for Post Quantum Cryptography CRYSTALS-Kyber Taishin Shimada, Makoto Ikeda (Univ. of Tokyo) VLD2021-81 HWS2021-58 |
CRYSTALS-Kyber is one of the public key cryptosystems being considered as a public key cryptosystem after the advent of ... [more] |
VLD2021-81 HWS2021-58 pp.31-36 |
NLP, MICT, MBE, NC (Joint) [detail] |
2022-01-23 10:15 |
Online |
Online |
A simple method for estimating phase and amplitude functions of limit-cycle oscillators by polynomial regression from time series data Norihisa Namura, Hiroya Nakao (Tokyo Tech.) NLP2021-122 MICT2021-97 MBE2021-83 |
In the real world, there are various nonlinear rhythmic phenomena, many of which can be modeled mathematically as limit-... [more] |
NLP2021-122 MICT2021-97 MBE2021-83 pp.237-242 |